Preferred Language
Articles
/
ahbLm4cBVTCNdQwCgFj5
Genetic--Based Face Retrieval Using Statistical Features
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Advanced GIS-based Multi-Function Support System for Identifying the Best Route
...Show More Authors

Geographic Information Systems (GIS) are obtaining a significant role in handling strategic applications in which data are organized as records of multiple layers in a database. Furthermore, GIS provide multi-functions like data collection, analysis, and presentation. Geographic information systems have assured their competence in diverse fields of study via handling various problems for numerous applications. However, handling a large volume of data in the GIS remains an important issue. The biggest obstacle is designing a spatial decision-making framework focused on GIS that manages a broad range of specific data to achieve the right performance. It is very useful to support decision-makers by providing GIS-based decision support syste

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi National Journal Of Chemistry
Synthesis of some benzofuran-based pyrazoline, isoxazoline, pyrmidine, cyclihexenone and indazole derivatives
...Show More Authors

In the present study benzofuran based chalcones 1 (a, b) are synthesized by condensing aromatic aldehydes with 2-acetylbenzofuran in the presence suitable base. These chalcones are very useful precursors for the synthesis of pyrazoline, isoxazoline, pyrmidine, cyclohexenone and indazole derivatives. All these compounds are characterized by their melting points, FTIR and 1 HMNR (for some of them) spectral dat

View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Dual Stages of Speech Enhancement Algorithm Based on Super Gaussian Speech Models
...Show More Authors

Various speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Oct 23 2021
Journal Name
Iraqi Journal Of Physics
Thin Film Dye Laser Based on BBQ Doped Poly (Methyl Meth-Acrylate)
...Show More Authors

This paper reports on the laser emission properties of the BBQ dye in poly (methyl meth-acrylate)(PMMA). This host material combines the advantages of an organic environment for dye with the thermoptical mechanical properties of an organic dye. A BBQ dye solid solution in PMMA polymer. A nitrogen laser in untuned laser cavity has pumped thin films. We developed the concentration and the thickness to get high efficiency. The laser efficiency had been increased from 7% at thickness 1.5 m to 16.5% at thickness 3.5m, and from 1% to 10% when concentration increased from 1x10-5M to 1x10-3 M

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Bat Algorithm Based an Adaptive PID Controller Design for Buck Converter Model
...Show More Authors

The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref